Cybersecurity: Information Asset Management, Security, and Compliance

Verified

Added on  2023/01/10

|3
|326
|72
Report
AI Summary
This report delves into the critical aspects of cybersecurity and information asset management. It emphasizes the importance of safeguarding confidential and personal information within organizations. The report highlights the necessity of implementing robust security measures to protect various types of information assets, including transactional, decision, and personal data. It discusses the application of standards like ISO/IEC 27001 to secure these assets and mentions other frameworks such as COBIT, ITIL, and PRINCE2 for comprehensive information management. The report also underscores the importance of a compliance program to mitigate risks and ensure adherence to relevant laws, policies, and regulations. The report also mentions the different types of information such as structured, unstructured, and semi-structured information. The report provides references to support the information.
Document Page
Cybersecurity
task
Student name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Solution: one
Cybersecurity is essential for securing information assets of a company. Data privacy and
security is necessary in order for their importance. There are different types of information present in an
organization, which can be used in different business functions. It is required to secure them from cyber-
attacks, such as transactional information, decision information, personal information, and management
information (Rouse, 2013).
Solution: two
To secure confidential and personal information of an organization, different standards can be
used to protect that information asset, such as personal computers, servers, network, switching devices,
and many others. ISO/IEC 27001 standard framework can be used to secure different types of
information assets of an organization (Verma, 2019). In addition, it is necessary to manage the level of
information based on their importance. The organization can use other standards, such as COBIT, ITIL,
PRINCE2, and many others ( Cobb, 2010). An organization has three levels of information, which is
structured, unstructured, and semi-structured. Therefore, to secure all the information, the compliance
program is necessary. That program will provide many benefits, such as reduce risks at the individual
and organizational level. The organization should compliance all the information assets with laws,
policies, and regulations.
Document Page
References
Cobb, M. (2010). ISO 27001 SoA: Creating an information security policy document. Retrieved March 12,
2019, from https://www.computerweekly.com/tip/ISO-27001-SoA-Creating-an-information-
security-policy-document
Rouse, M. (2013). information asset . Retrieved December 12, 2018, from
https://whatis.techtarget.com/definition/information-assets
Verma, S. (2019, january 26). ISO 27001 Implementation — Step By Step Guide. Retrieved April 8, 2019,
from https://www.sync-resource.com/blog/iso-27001-implementation-guide/
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]